计算机安全:ESORICS 2006/会议录

计算机安全:ESORICS 2006/会议录
作 者: Eugene Asarin Dieter Gollmann Jan Meier
出版社: 湖南文艺出版社
丛编项:
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 暂缺
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《计算机安全:ESORICS 2006/会议录》作者简介

内容简介

This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006, held in Hamburg, Germany, in September 2006.The 32 revised full papers presented were carefully reviewed and selected from 160 submissions. ESORICS is confirmed as the European research event in computer security; it presents original research contributions, case studies and implementation experiences addressing any aspect of computer security - in theory, mechanisms, applications, or practical experience.

图书目录

Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors

Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses

TrustedPals: Secure Multiparty Computation Implemented with Smart Cards

Private Information Retrieval Using Trusted Hardware

Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components

License Transfer in OMA-DRM

Enhanced Security Architecture for Music Distribution on Mobile

A Formal Model of Access Control for Mobile Interactive Devices

Discretionary Capability Confinement

Minimal Threshold Closure

Reducing the Dependence of SPKI/SDSI on PKI

Delegation in Role-Based Access Control

Applying a Security Requirements Engineering Process

Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System

A Formal Framework for Confidentiality-Preserving Refinement

Timing-Sensitive Information Flow Analysis for Synchronous Systems

HBAC: A Model for History-Based Access Control and Its Model Checking

From Coupling Relations to Mated Invariants for Checking Information Flow

A Linear Logic of Authorization and Knowledge

Pret a Voter with Re-encryption Mixes

Secure Key-Updating for Lazy Revocation

Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems

Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos

Deriving Secrecy in Key Establishment Protocols

……

Author Index